Privacy and Security

Colgate is entrusted with copious amounts of private information and irreplaceable research data. To ensure the confidentiality, integrity, and availability of this information, Colgate takes a layered approach to security. Here you can learn about the methods we deploy and what steps you can take to stay safe.

Always Use Strong Passwords

Using strong passwords is the first step in online security. With all the crazy rules and complexity, how do we make a strong password we can remember and don't have to write down? By substituting letters for numbers or symbols, we learn the two rules to creating strong passwords are simply to be creative and have fun! PASSWORDS

Catch Phishing Emails Before They Catch You!

Phishing attacks are designed to steal your passwords or other personal information and can even be used to spread viruses and install malware on your computer. The number one rule to avoiding scams is to never open a link from inside your e-mail, ever! Some of these criminals who phish are really good and their scams are tough to identify! Here is some information you can use to avoid biting the hook! PHISHING

Use Antivirus - Update & Patch Your Devices

Anti-virus is a vital part of the layered security approach. Antivirus is installed on all Colgate-owned servers and workstations and is required for connecting to Colgate's network. Along with antivirus, all systems and software should be updated on a regular basis. ANTI-VIRUS

Best Practices

Colgate educates its students, faculty, and staff about the best ways to keep their data secure. Through workshops, e-mails, blogs, and various other methods, users can learn about how to create good passwords, keep their systems up to date, secure their laptops, tablets, or smartphones, and much more. BEST PRACTICES

Network Access Control

Colgate provides multiple tools to protect computers and network resources from unauthorized and unwarranted access. Systems which are not equipped with updated patches and antivirus are vulnerable to network attacks. To help prevent this, Colgate requires that each machine meet a baseline security configuration before connecting to the network. NETWORK ACCESS CONTROL

Firewalls

Hardware firewalls are used at Colgate to protect the borders between the Internet and the campus network and also between the campus network and the data center. Firewall software is also configured on Colgate's servers. Every computer is equipped with a firewall and it is recommended that it be turned on. FIREWALLS

Online Safety and Behavior

The Internet and social media brings with it a whole new way to connect with friends and strangers the world over. Keeping in mind that not everyone is who they say they are, or, may behave differently when behind the glow of a computer screen, Colgate tries to educate its students, faculty, and staff about the caveats and disconnects that come with a connected world. ONLINE SAFETY AND BEHAVIOR

Stay Informed

All people have a choice to leverage technology for good or bad. One of the best ways to stay protected is to stay informed regarding the bad ways some people choose to use the Internet, social media, and computers. Knowing what could happen enables us to make more informed decisions when trying to get our good work done. STAY INFORMED